MTCAP- Upgrade firmware mPower-5.1.2

Home Forums Conduit: AEP Model MTCAP- Upgrade firmware mPower-5.1.2

Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • #30061

    Hi,

    I am trying to do firmware upgrade from mPower-5.1.2 to mPower-5.1.2 using

    curl commands and it failed:

    I also have tried the below commands:

    curl -k -b headers -X PUT -H “Content-Type: application/json” -d ‘{“signedFirmwareValidation”:false}’ https://192.168.2.1/api/system

    curl -k -b headers -X POST -d “” https://192.168.2.1/api/command/save

    Ubuntu:
    =======

    (env) test@test-VirtualBox:/Downloads/mtcap/5.1.2$ curl -i -k -d “username=admin&password=Testing1234&submit=Login” –dump-header headers https://192.168.2.1/api/login
    HTTP/1.1 200 OK
    Set-Cookie: token=A78FF0536EF3BC8B7C1050A932725237; Path=/; Secure
    Cache-Control: no-cache
    Content-type: application/json
    Access-Control-Allow-Origin: *
    Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    X-Content-Type-Options: nosniff
    Referrer-Policy: strict-origin-when-cross-origin
    Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
    Strict-Transport-Security: max-age=31536000
    Content-Length: 321
    Date: Sat, 07 Dec 2019 11:24:06 GMT

    {
    “code” : 200,
    “result” : {
    “address” : “192.168.2.2”,
    “isipcuser” : false,
    “isremoteuser” : false,
    “permission” : “admin”,
    “port” : “47100”,
    “timestamp” : “11:24:6:459”,
    “token” : “A78FF0536EF3BC8B7C1050A932725237”,
    “user” : “admin”
    },
    “status” : “success”
    }
    (env) test@test-VirtualBox:~/Downloads/mtcap/5.1.2$ curl -i -k -b headers –http1.0 -F file=@MTCAP_5.1.2_upgrade-signed.bin https://192.168.2.1/api/command/firmware_upgrade
    HTTP/1.0 400 Bad Request
    Set-Cookie: token=A78FF0536EF3BC8B7C1050A932725237; Path=/; Secure
    Cache-Control: no-cache
    Content-type: application/json
    Access-Control-Allow-Origin: *
    Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    X-Content-Type-Options: nosniff
    Referrer-Policy: strict-origin-when-cross-origin
    Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
    Strict-Transport-Security: max-age=31536000
    Content-Length: 116
    Connection: close
    Date: Sat, 07 Dec 2019 11:25:58 GMT

    {
    “code” : 400,
    “error” : “Firmware upgrade failed. Invalid firmware update package.”,
    “status” : “fail”
    }

    ==================
    ##############################################
    var/log/api.log

    ==================
    ….
    2019-12-07T11:25:22.587803+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-07T11:25:22.588300+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-07T11:25:22.943094+00:00 mtcap API: [SESSION] Ending FCGI Request [253] as [RESPONDER]
    2019-12-07T11:25:22.965737+00:00 mtcap lighttpd[1551]: � localhost – [07/Dec/2019:11:25:22 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-07T11:25:47.053659+00:00 mtcap API: [SESSION] Starting FCGI Request [254]
    2019-12-07T11:25:47.055425+00:00 mtcap API: [SESSION] StdIn Length [106219742] greater than allowed maximum. Reducing to 102400000.
    2019-12-07T11:25:56.203491+00:00 mtcap API: [SESSION] count 219742 total 106219742 v_mStdIn.size 106
    2019-12-07T11:25:56.237974+00:00 mtcap API: [SESSION] Response Started
    2019-12-07T11:25:56.240909+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [47100] Token [A78FF0536EF3BC8B7C1050A932725237]
    2019-12-07T11:25:56.282569+00:00 mtcap API: [SESSION] num StdIn chunks :106
    2019-12-07T11:25:57.994678+00:00 mtcap API: [SESSION] Uploading File:#012{#012 “filename” : “MTCAP_5.1.2_upgrade-signed.bin”,#012 “size” : 106219520,#012 “type” : “application/octet-stream”#012}#012
    2019-12-07T11:25:57.995945+00:00 mtcap API: [SESSION] Successfully uploaded /var/tmp/MTCAP_5.1.2_upgrade-signed.bin
    2019-12-07T11:25:57.998040+00:00 mtcap API: [ROUTER][ADD][command/firmware_upgrade]
    2019-12-07T11:25:58.001281+00:00 mtcap API: [CMDCTRLR] Upgrading System Firmware
    2019-12-07T11:25:58.004466+00:00 mtcap API: [COMMAND][UPGRADE] firmware_upgrade ‘/var/tmp/upgrade.bin’
    2019-12-07T11:25:58.310631+00:00 mtcap API: [COMMAND][UPGRADE] Call to system() returned: [23552] errno = [0] error: [Success]
    2019-12-07T11:25:58.316162+00:00 mtcap API: [CMDCTRLR] Starting node-red
    2019-12-07T11:25:58.361384+00:00 mtcap API: [CMDCTRLR] Starting Lora Network Server
    2019-12-07T11:25:58.425517+00:00 mtcap API: [SESSION] Ending FCGI Request [254] as [RESPONDER]

    ==================

    Any ideas?

    Thanks

    #30062

    /var/log/messages:
    ==================
    2019-12-10T10:54:54.846805+00:00 mtcap watchdog: User-Space Watchdog Running : [ /dev/watchdog ] opts [ ]
    2019-12-10T10:59:42.904570+00:00 mtcap firmware_upgrade: info: Starting firmware upgrade procedure
    2019-12-10T10:59:43.092039+00:00 mtcap firmware_upgrade: error: Cannot list upgrade package content
    2019-12-10T10:59:43.121356+00:00 mtcap firmware_upgrade: info: Firmware upgrade procedure exited with 92 code
    2019-12-10T10:59:49.687091+00:00 mtcap 2019-12-10 10:59:49,684 – aep-utils – INFO – (‘Successfully queried nodeRed enabled: {\n “code” : 200,\n “result” : true,\n “status” : “success”\n}\n’,)
    ==================

    Notes: If I am using the same MTCAP_5.1.2_upgrade-signed.bin and upgrade via WEB GUI, it worked.

    #30063
    Jason Reiss
    Keymaster

    Any difference in the api.log between using API and GUI?
    You could also look at the API calls being made by the Web GUI for differences.

    #30064

    It looks like the WEB GUI is issuing the command – /firmware_pre_upgrade/ before calling the: /firmware_upgrade/ api:

    =============================

    (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36″
    2019-12-10T11:27:43.770751+00:00 mtcap API: [SESSION] Starting FCGI Request [11967]
    2019-12-10T11:27:43.772712+00:00 mtcap API: [SESSION] count 75 total 75 v_mStdIn.size 1
    2019-12-10T11:27:43.773126+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T11:27:43.775291+00:00 mtcap API: [SESSION] Authorized Web User [admin] Permission [admin] IP [192.168.2.2] Port [50638] Token [21FD52652E3E13B924E5A896F4CE56]
    2019-12-10T11:27:43.776094+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
    2019-12-10T11:27:43.776575+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
    2019-12-10T11:27:43.779963+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: {#012 “info” : {#012 “fileName” : “MTCAP_5.1.2_upgrade-signed.bin”,#012 “fileSize” : 106219520#012 }#012}
    2019-12-10T11:27:44.588975+00:00 mtcap API: [CMDCTRLR] Stopping node-red
    2019-12-10T11:27:44.670628+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
    2019-12-10T11:27:44.767586+00:00 mtcap API: [SESSION] Ending FCGI Request [11967] as [RESPONDER]

    ========================
    However, I tried it with the curl command and I am getting the following:

    ====================================================
    Ubuntu:
    =======

    VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“filename” : “MTCAP_5.1.2_upgrade-signed.bin”,”size” : 106219520,”type” : “application/octet-stream”}’ https://192.168.2.1/api/command/firmware_pre_upgrade
    HTTP/1.1 200 OK
    Set-Cookie: token=FB76B78DB94B40AAEE3028F79BEDFC7E; Path=/; Secure
    Cache-Control: no-cache
    Content-type: application/json
    Access-Control-Allow-Origin: *
    Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    X-Content-Type-Options: nosniff
    Referrer-Policy: strict-origin-when-cross-origin
    Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
    Strict-Transport-Security: max-age=31536000
    Content-Length: 45
    Date: Tue, 10 Dec 2019 11:48:04 GMT

    {
    “code” : 200,
    “status” : “success”
    }
    =========================================
    /var/log/api.log:
    =================
    2019-12-10T12:05:07.698380+00:00 mtcap API: [SESSION] count 102 total 102 v_mStdIn.size 1
    2019-12-10T12:05:07.700389+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:05:07.703221+00:00 mtcap API: [SESSION] AUTHORIZATION FAILED! IP [192.168.2.2] Port [50768] Code [401 Unauthorized]
    2019-12-10T12:05:07.704377+00:00 mtcap API: [SESSION] Ending FCGI Request [208] as [RESPONDER]
    2019-12-10T12:05:07.707988+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:05:07 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 401 77 “-” “curl/7.35.0”
    2019-12-10T12:05:10.627122+00:00 mtcap API: [SESSION] Starting FCGI Request [209]
    2019-12-10T12:05:10.629636+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:05:10.631303+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:05:10.632687+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:05:10.780381+00:00 mtcap API: [SESSION] Ending FCGI Request [209] as [RESPONDER]
    2019-12-10T12:05:10.783049+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:05:10 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:05:33.380307+00:00 mtcap API: [SESSION] Starting FCGI Request [210]
    2019-12-10T12:05:33.382136+00:00 mtcap API: [SESSION] count 46 total 46 v_mStdIn.size 1
    2019-12-10T12:05:33.382554+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:05:34.039155+00:00 mtcap API: pam_unix(api:session): session opened for user admin by (uid=0)
    2019-12-10T12:05:34.044183+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50770] Token [8897D444E53E7DDE688E60D4ADDB9D56]
    2019-12-10T12:05:34.046503+00:00 mtcap API: [SESSION] Ending FCGI Request [210] as [RESPONDER]
    2019-12-10T12:05:34.049653+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:05:33 +0000] “POST /api/login HTTP/1.1” 200 321 “-” “curl/7.35.0”
    2019-12-10T12:05:40.791852+00:00 mtcap API: [SESSION] Starting FCGI Request [211]
    2019-12-10T12:05:40.794456+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:05:40.796385+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:05:40.798208+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:05:40.944203+00:00 mtcap API: [SESSION] Ending FCGI Request [211] as [RESPONDER]
    2019-12-10T12:05:40.946445+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:05:40 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:05:43.160795+00:00 mtcap API: [SESSION] Starting FCGI Request [212]
    2019-12-10T12:05:43.162730+00:00 mtcap API: [SESSION] count 102 total 102 v_mStdIn.size 1
    2019-12-10T12:05:43.163139+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:05:43.165203+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50770] Token [8897D444E53E7DDE688E60D4ADDB9D56]
    2019-12-10T12:05:43.166007+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
    2019-12-10T12:05:43.166524+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
    2019-12-10T12:05:43.166776+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
    2019-12-10T12:05:43.166990+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid

    =========================================

    Any ideas?

    #30065
    Jason Reiss
    Keymaster

    The json provided to the curl command did not match the UI call.

    {“info” : { “fileName” : “MTCAP_5.1.2_upgrade-signed.bin”, “fileSize” : 106219520 }}

    #30066

    Ubuntu:
    =======

    VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“info”:{“filename” : “MTCAP_5.1.2_upgrade-signed.bin”,”size” : 106219520,”type” : “application/octet-stream”}}’ https://192.168.2.1/api/command/firmware_pre_upgrade
    HTTP/1.1 200 OK
    Set-Cookie: token=E3C1528DC8F2793FF214B26FCFDB1; Path=/; Secure
    Cache-Control: no-cache
    Content-type: application/json
    Access-Control-Allow-Origin: *
    Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    X-Content-Type-Options: nosniff
    Referrer-Policy: strict-origin-when-cross-origin
    Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
    Strict-Transport-Security: max-age=31536000
    Content-Length: 45
    Date: Tue, 10 Dec 2019 12:53:03 GMT

    {
    “code” : 200,
    “status” : “success”
    }

    ======================================
    /var/log/api:
    ============

    root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
    2019-12-10T12:52:52.439913+00:00 mtcap API: [CMDCTRLR] Stopping node-red
    2019-12-10T12:52:52.483823+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
    2019-12-10T12:52:52.540734+00:00 mtcap API: [SESSION] Ending FCGI Request [355] as [RESPONDER]
    2019-12-10T12:52:52.567407+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:52:51 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 200 45 “-” “curl/7.35.0”
    2019-12-10T12:52:56.988752+00:00 mtcap API: [SESSION] Starting FCGI Request [356]
    2019-12-10T12:52:56.991023+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:52:56.993067+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:52:56.994460+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:52:57.139427+00:00 mtcap API: [SESSION] Ending FCGI Request [356] as [RESPONDER]
    2019-12-10T12:52:57.141679+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:52:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:53:01.865013+00:00 mtcap API: [SESSION] Starting FCGI Request [357]
    2019-12-10T12:53:01.866484+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:53:01.867333+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:53:01.868057+00:00 mtcap API: [ROUTER][GET][syslog]
    2019-12-10T12:53:01.869334+00:00 mtcap API: [SESSION] Ending FCGI Request [357] as [RESPONDER]
    2019-12-10T12:53:01.879031+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:53:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
    2019-12-10T12:53:02.548040+00:00 mtcap API: [SESSION] Starting FCGI Request [358]
    2019-12-10T12:53:02.549709+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
    2019-12-10T12:53:02.551776+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:53:02.554708+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
    2019-12-10T12:53:02.556161+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
    2019-12-10T12:53:02.557510+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
    2019-12-10T12:53:02.558909+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
    2019-12-10T12:53:02.559153+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
    ======================================

    I have tried it and still same issue.

    #30067
    Jason Reiss
    Keymaster

    It still does not match.
    Try changing “filename” to “fileName” and “size” to “fileSize”.

    #30068

    VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -d “username=admin&password=Testing1234&submit=Login” –dump-header headers https://192.168.2.1/api/loginHTTP/1.1 200 OK
    Set-Cookie: token=A95A1836ECEE92134A5688B17DAEFB5F; Path=/; Secure
    Cache-Control: no-cache
    Content-type: application/json
    Access-Control-Allow-Origin: *
    Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    X-Content-Type-Options: nosniff
    Referrer-Policy: strict-origin-when-cross-origin
    Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
    Strict-Transport-Security: max-age=31536000
    Content-Length: 322
    Date: Tue, 10 Dec 2019 13:12:16 GMT

    {
    “code” : 200,
    “result” : {
    “address” : “192.168.2.2”,
    “isipcuser” : false,
    “isremoteuser” : false,
    “permission” : “admin”,
    “port” : “51016”,
    “timestamp” : “13:12:16:474”,
    “token” : “A95A1836ECEE92134A5688B17DAEFB5F”,
    “user” : “admin”
    },
    “status” : “success”
    }
    VirtualBox:~/Documents/python/review-12-16-19/review/ssh-login$ curl -i -k -b headers -X POST -d ‘{“info”:{“fileName” : “MTCAP_5.1.2_upgrade-signed.bin”,”fileSize” : 106219520}}’ https://192.168.2.1/api/command/firmware_pre_upgradeHTTP/1.1 200 OK
    Set-Cookie: token=A95A1836ECEE92134A5688B17DAEFB5F; Path=/; Secure
    Cache-Control: no-cache
    Content-type: application/json
    Access-Control-Allow-Origin: *
    Content-Security-Policy: default-src ‘self’; script-src ‘unsafe-inline’ ‘unsafe-eval’ ‘self’; style-src ‘unsafe-inline’ https://fonts.googleapis.com ‘self’; font-src https://fonts.gstatic.com ‘self’; connect-src ‘self’; img-src ‘self’ data:
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    X-Content-Type-Options: nosniff
    Referrer-Policy: strict-origin-when-cross-origin
    Feature-Policy: accelerometer ‘none’; camera ‘none’; geolocation ‘none’; gyroscope ‘none’; payment ‘none’; usb ‘none’
    Strict-Transport-Security: max-age=31536000
    Content-Length: 45
    Date: Tue, 10 Dec 2019 13:13:20 GMT

    {
    “code” : 200,
    “status” : “success”
    }

    /var/log/api:
    =============
    root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
    2019-12-10T12:50:56.202133+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:50:56.202872+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:50:56.344193+00:00 mtcap API: [SESSION] Ending FCGI Request [347] as [RESPONDER]
    2019-12-10T12:50:56.346449+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:50:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:51:01.881197+00:00 mtcap API: [SESSION] Starting FCGI Request [348]
    2019-12-10T12:51:01.882596+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:51:01.883444+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:51:01.884181+00:00 mtcap API: [ROUTER][GET][syslog]
    2019-12-10T12:51:01.885425+00:00 mtcap API: [SESSION] Ending FCGI Request [348] as [RESPONDER]
    2019-12-10T12:51:01.895475+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
    2019-12-10T12:51:26.356200+00:00 mtcap API: [SESSION] Starting FCGI Request [349]
    2019-12-10T12:51:26.357322+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:51:26.358155+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:51:26.358749+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:51:26.502364+00:00 mtcap API: [SESSION] Ending FCGI Request [349] as [RESPONDER]
    2019-12-10T12:51:26.508261+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:26 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:51:36.129324+00:00 mtcap API: [SESSION] Starting FCGI Request [350]
    2019-12-10T12:51:36.131180+00:00 mtcap API: [SESSION] count 46 total 46 v_mStdIn.size 1
    2019-12-10T12:51:36.131601+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:51:37.131087+00:00 mtcap API: pam_unix(api:session): session opened for user admin by (uid=0)
    2019-12-10T12:51:37.135492+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
    2019-12-10T12:51:37.136516+00:00 mtcap API: [SESSION] Ending FCGI Request [350] as [RESPONDER]
    2019-12-10T12:51:37.139004+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:51:36 +0000] “POST /api/login HTTP/1.1” 200 319 “-” “curl/7.35.0”
    2019-12-10T12:51:56.512499+00:00 mtcap API: [SESSION] Starting FCGI Request [351]
    2019-12-10T12:51:56.513664+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:51:56.514497+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:51:56.515214+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:51:56.661023+00:00 mtcap API: [SESSION] Ending FCGI Request [351] as [RESPONDER]
    2019-12-10T12:51:56.663275+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:51:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:51:57.834360+00:00 mtcap API: [SESSION] Starting FCGI Request [352]
    2019-12-10T12:51:57.836290+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
    2019-12-10T12:51:57.836705+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:51:57.838761+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
    2019-12-10T12:51:57.841679+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
    2019-12-10T12:51:57.843016+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
    2019-12-10T12:51:57.844117+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
    2019-12-10T12:51:57.845201+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
    ^C
    root@mtcap:/var/config/home/admin# tail -f /var/log/api.log
    2019-12-10T12:52:52.439913+00:00 mtcap API: [CMDCTRLR] Stopping node-red
    2019-12-10T12:52:52.483823+00:00 mtcap API: [CMDCTRLR] Stopping Lora Network Server
    2019-12-10T12:52:52.540734+00:00 mtcap API: [SESSION] Ending FCGI Request [355] as [RESPONDER]
    2019-12-10T12:52:52.567407+00:00 mtcap lighttpd[3909]: 192.168.2.2 192.168.2.1 – [10/Dec/2019:12:52:51 +0000] “POST /api/command/firmware_pre_upgrade HTTP/1.1” 200 45 “-” “curl/7.35.0”
    2019-12-10T12:52:56.988752+00:00 mtcap API: [SESSION] Starting FCGI Request [356]
    2019-12-10T12:52:56.991023+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:52:56.993067+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:52:56.994460+00:00 mtcap API: [ROUTER][GET][waninfo/wans]
    2019-12-10T12:52:57.139427+00:00 mtcap API: [SESSION] Ending FCGI Request [356] as [RESPONDER]
    2019-12-10T12:52:57.141679+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:52:56 +0000] “GET /api/waninfo/wans HTTP/1.1” 200 1352 “-” “-”
    2019-12-10T12:53:01.865013+00:00 mtcap API: [SESSION] Starting FCGI Request [357]
    2019-12-10T12:53:01.866484+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:53:01.867333+00:00 mtcap API: [SESSION] Authorized Agent [] Permission [admin] IP [127.0.0.1] Port [] Token []
    2019-12-10T12:53:01.868057+00:00 mtcap API: [ROUTER][GET][syslog]
    2019-12-10T12:53:01.869334+00:00 mtcap API: [SESSION] Ending FCGI Request [357] as [RESPONDER]
    2019-12-10T12:53:01.879031+00:00 mtcap lighttpd[3909]: ^ localhost – [10/Dec/2019:12:53:01 +0000] “GET /api/syslog HTTP/1.1” 200 314 “-” “-”
    2019-12-10T12:53:02.548040+00:00 mtcap API: [SESSION] Starting FCGI Request [358]
    2019-12-10T12:53:02.549709+00:00 mtcap API: [SESSION] count 111 total 111 v_mStdIn.size 1
    2019-12-10T12:53:02.551776+00:00 mtcap API: [SESSION] Response Started
    2019-12-10T12:53:02.554708+00:00 mtcap API: [SESSION] Authorized Agent [admin] Permission [admin] IP [192.168.2.2] Port [50864] Token [E3C1528DC8F2793FF214B26FCFDB1]
    2019-12-10T12:53:02.556161+00:00 mtcap API: [ROUTER][ADD][command/firmware_pre_upgrade]
    2019-12-10T12:53:02.557510+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Pre Upgrading System Firmware
    2019-12-10T12:53:02.558909+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware Upgrade Info: null
    2019-12-10T12:53:02.559153+00:00 mtcap API: [CMDCTRLR][PRE-UPGRADE] Firmware file size of not provided or not valid
    =================================================

    …Still no luck.

Viewing 8 posts - 1 through 8 (of 8 total)
  • You must be logged in to reply to this topic.